In this lab, you will explore how attackers can exploit misconfigurations in the AWS cloud to collect details, perform reconnaissance, and exfiltrate data. You will learn to identify and exploit common vulnerabilities, such as overly permissive IAM roles and public S3 buckets. From the defender’s perspective, you will use AWS CloudTrail, S3 access logs, and EC2 images to detect suspicious activities and unauthorized access. Through practical exercises, you will gain hands-on experience in both attacking and defending cloud environments, ultimately learning best practices for continuous monitoring and incident response in AWS.
You will get access to all the evidence collected from the breached server & AWS logs.
Password: threatbreach.io
Download any one of them either vmdk or 7z [ contains dd ], if vmdk is downloaded convert them into dd using below command ⏬
qemu-img convert -f vmdk -O raw /Path/To/Disk_Image.vmdk /Path/To/Disk_Image.dd
Link To Evidence | SHA1 |
---|---|
🔗 cloudtrail-logs.zip | 93a0809d7b7ee987d27db63e89be6599459d0fe7 |
🔗 s3accesslogs.zip | 06ebcba30d045ab1db4f206f4c976ecd16c0d9ca |
🔗 WebServerProd-ec2.vmdk | 511bb799464b6c428a2349ca6b8281958262582c |
🔗 WebServerProd-ec2.7z | e0f33c15b0dce42b20a8d507edac8a8c46932460 |
🔗 Second-EC2-SERVER.vmdk | e2f280b0766293d5f289655c344bb7f62f37a9e9 |
🔗 Second-EC2-SERVER.7z | fd4f1e0176d00defa5175c987ce9614ffa0f4595 |
Writeup will be published soon, If you want to send your writeup to be evaluated share it on labs[@]threatbreach.io